System & Network Admin

System & Network Admin

2081 bookmarks
Custom sorting
Automate the Boring Stuff with Kubernetes
Automate the Boring Stuff with Kubernetes
You can automate a factory with Kubernetes. You can run civic watering systems with it. You can bank on it. It’s anything but tedious.
·thenewstack.io·
Automate the Boring Stuff with Kubernetes
Introducing Spin 2.0
Introducing Spin 2.0
Spin 2.0 — the open source developer tool for building, distributing, and running WebAssembly (Wasm) applications in the cloud.
·fermyon.com·
Introducing Spin 2.0
3 Best Universal Package Managers for Linux in 2023
3 Best Universal Package Managers for Linux in 2023
We will explore the best open-source universal or cross-distribution package management systems for Linux, often referred to as "Universal Package Managers".
·tecmint.com·
3 Best Universal Package Managers for Linux in 2023
OSSEC - World's Most Widely Used Host Intrusion Detection System - HIDS
OSSEC - World's Most Widely Used Host Intrusion Detection System - HIDS
OSSEC is a multiplatform, open source and free Host Intrusion Detection System (HIDS). You can tailor OSSEC for your security needs through its extensive configuration options, adding custom alert rules and writing scripts.
·ossec.net·
OSSEC - World's Most Widely Used Host Intrusion Detection System - HIDS
NixOS Reproducible Builds: minimal installation ISO successfully independently rebuilt
NixOS Reproducible Builds: minimal installation ISO successfully independently rebuilt
We have successfully created an independent, bit-by-bit-identical rebuild of the nixos-minimal ISO published by Hydra 🎉 Why is this useful? While there are a number of ‘side-benefits’, the main point of Reproducible Builds is that it gives us a reliable way to verify the binaries we ship are faithful to their sources, and have not been tampered with anywhere in the build pipeline (e.g. on Hydra). For general information on Reproducible Builds see: What exactly was reproduced? This me...
·discourse.nixos.org·
NixOS Reproducible Builds: minimal installation ISO successfully independently rebuilt
MicroK8s - Zero-ops Kubernetes for developers, edge and IoT | MicroK8s
MicroK8s - Zero-ops Kubernetes for developers, edge and IoT | MicroK8s
MicroK8s is the simplest production-grade conformant K8s. Lightweight and focused. Single command install on Linux, Windows and macOS. Made for devOps, great for edge, appliances and IoT. Full high availability Kubernetes with autonomous clusters and distributed storage.
·microk8s.io·
MicroK8s - Zero-ops Kubernetes for developers, edge and IoT | MicroK8s
Making a micro Linux distro
Making a micro Linux distro
A guide on building a simple Linux distribution from scratch. Detailed guide on building the kernel and the init process. Finally, a little distribution is built with u-root that is capable of connecting to the Internet.
·popovicu.com·
Making a micro Linux distro
Using the SSH Config File
Using the SSH Config File
OpenSSH allows you to set up a per-user configuration file where you can store different SSH options for each remote machine you connect to. This article covers the basics of the SSH client configuration file and explains some of the most common configuration options.
·linuxize.com·
Using the SSH Config File
Automating NetBox with Ansible: How to Create Devices with Primary IPs
Automating NetBox with Ansible: How to Create Devices with Primary IPs
NetBox is a hugely popular open-source IP address management (IPAM) and data centre infrastructure management (DCIM) tool. NetBox provides a range of automation features, one of which is the ability to update NetBox with Ansible using the Ansible NetBox collection. In this short post, we'll walk through the process of
·packetcoders.io·
Automating NetBox with Ansible: How to Create Devices with Primary IPs
websocketd
websocketd
·websocketd.com·
websocketd
Zombie Resources Eat up Your Cloud Budget
Zombie Resources Eat up Your Cloud Budget
Relying on manual checks for proper infrastructure allocation and utilization adds to the burden of wasted resources and expenses for companies large and small.
·thenewstack.io·
Zombie Resources Eat up Your Cloud Budget
Onboarding Your Customers with Let's Encrypt and ACME
Onboarding Your Customers with Let's Encrypt and ACME
If you work at a hosting provider or CDN, ACME’s DNS-01 validation method can make it a lot easier to onboard new customers who have an existing HTTPS website at another provider. Before your new customer points their domain name at your servers, you need to have a certificate already installed for them. Otherwise visitors to the customer’s site will see an outage for a few minutes while you issue and install a certificate.
·letsencrypt.org·
Onboarding Your Customers with Let's Encrypt and ACME
Ln Command in Linux (Create Symbolic Links)
Ln Command in Linux (Create Symbolic Links)
A symbolic link, also known as a symlink or soft link, is a special type of file that points to another file or directory. In this guide, we will cover how to use the ln command to create symbolic links.
·linuxize.com·
Ln Command in Linux (Create Symbolic Links)